WO2015149353A1 - Procédé de traitement de paquets oam, dispositif de réseau, et système de réseau - Google Patents

Procédé de traitement de paquets oam, dispositif de réseau, et système de réseau Download PDF

Info

Publication number
WO2015149353A1
WO2015149353A1 PCT/CN2014/074808 CN2014074808W WO2015149353A1 WO 2015149353 A1 WO2015149353 A1 WO 2015149353A1 CN 2014074808 W CN2014074808 W CN 2014074808W WO 2015149353 A1 WO2015149353 A1 WO 2015149353A1
Authority
WO
WIPO (PCT)
Prior art keywords
oam
packet
message
forwarding
reply
Prior art date
Application number
PCT/CN2014/074808
Other languages
English (en)
Chinese (zh)
Inventor
梁剑耀
罗会斌
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2014/074808 priority Critical patent/WO2015149353A1/fr
Priority to CN201480000456.6A priority patent/CN105308904B/zh
Priority to EP14887910.9A priority patent/EP3116160B1/fr
Publication of WO2015149353A1 publication Critical patent/WO2015149353A1/fr
Priority to US15/284,696 priority patent/US10116546B2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/18Protocol analysers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/10Active monitoring, e.g. heartbeat, ping or trace-route
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0817Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0876Network utilisation, e.g. volume of load or congestion level
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0811Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to an OAM packet processing method, a network device, and a network system.
  • the management of the network is generally divided into three categories: Operation, Administration, and Maintenance.
  • OAM The main functions of OAM include OAM capability negotiation, link connectivity monitoring and path tracking, fault indication, loopback test, and delay packet loss rate.
  • OAM packets are generally transmitted using a special Ethernet type, a destination MAC (Media Access Control) address, or a port (Port) for OAM detection.
  • Ethernet OAM technology can effectively improve the management and maintenance capabilities of Ethernet and ensure stable operation of the network.
  • Ethernet OAM technology is implemented hierarchically and is divided into the following two levels:
  • Link-level Ethernet OAM technology It is used to monitor the link status between the user network and the carrier network.
  • the typical protocol is EFM 0 AM (Ethernet in the First Mile OAM).
  • the EFM OAM message uses a special destination MAC address and a specified Ethernet protocol type.
  • Network-level Ethernet OAM technology It is applied to the access aggregation layer of the network to monitor the connectivity of the entire network and locate connectivity faults of the network.
  • the typical protocol is the CFM (Connected Fault Management) protocol.
  • EtherType Ethernet protocol type 0x8902
  • CFM OAM packets use the specified Ethernet protocol type.
  • BFD Bidirectional Forwarding Detection
  • the OAM packet uses a special destination port number to implement OAM detection.
  • the EFM OAM packet uses a special EtherType and a destination MAC address.
  • the CFM OAM packet uses a special EtherType.
  • the BFD packet uses a special destination port number, which means that the ETH OAM packet and the service packet have Different EtherTypes and destination MAC addresses, CFM OAM packets and service packets have different EtherTypes. BFD packets and service packets have different destination port numbers. If the network device matches EtherType, destination MAC address, or destination for service packets.
  • Openflow is a protocol for implementing Software Defined Network (SDN).
  • SDN Software Defined Network
  • the OpenFlow network implements the separation of the data forwarding layer and the control layer.
  • the OpenFlow switch is responsible for data forwarding. After receiving the data packet, the OpenFlow switch matches the flow entry in the flow table. The flow entry is used to indicate the switch processing method for the data packet. The data packet is forwarded according to the matching flow entry.
  • OpenFlow switches have multiple matching domains that can be flexibly combined, making this problem more probable.
  • the embodiment of the invention provides an OAM packet processing method, a network device and a network system, which can improve the capability of OAM method fault detection.
  • a first aspect of the present invention provides an OAM packet processing method, where the method includes:
  • the first IP packet includes an OAM packet
  • the IP packet header of the OAM packet includes first OAM information
  • the first OAM information includes a first source device ID and a first sink device ID
  • the second OAM information includes a second source device ID and a second sink device ID, where the second source device ID is an ID of the local network device, and the second sink device ID and the first A source device ID is the same.
  • the method before the returning the second IP packet, the method further includes:
  • the returning the second IP packet is specifically: if the predetermined reply condition is met, returning the second IP packet, where the second OAM information further includes a second packet type, the second packet The file type is 0 AM to detect a reply message;
  • the first OAM information further includes a first packet type
  • the predetermined reply condition includes: the first sink device ID is the same as the ID of the local network device, and the first packet type is OAM. Detect the message.
  • the method further includes:
  • the method before the forwarding the OAM packet, the method further includes:
  • the first OAM information further includes a first forwarding count value
  • the predetermined forwarding condition includes: the first forwarding counter value is greater than a predetermined first threshold, and the first sink device ID is not an ID of the local network device;
  • the forwarding of the OAM packet includes: subtracting the first forwarding counter value by a fixed value, and forwarding the OAM packet.
  • a second aspect of the present invention provides a network device, including:
  • a receiving unit configured to receive a first IP packet, where the first IP packet includes an OAM packet, where
  • the IP packet header of the OAM packet includes the first OAM information, and the first OAM information includes the first source device ID and the first sink device ID.
  • a reply unit configured to return a second IP packet, and reply to the OAM packet, where the second
  • the IP packet includes an OAM reply packet, and the IP packet header of the OAM reply packet includes second OAM information corresponding to the first OAM information, and the second OAM information includes the second source device.
  • An ID a second sink device ID, where the second source device ID is an ID of the local network device, and the second sink device ID is the same as the first source device ID.
  • the network device further includes:
  • the second OAM information further includes a second packet type, where the second packet type is an OAM detection response packet;
  • the first OAM information further includes a first packet type, where the predetermined reply condition includes: the first sink device ID is the same as the ID of the local network device, and the first packet type is
  • OAM detects packets.
  • the network device further includes:
  • a forwarding unit configured to: when the OAM message does not meet the predetermined reply condition,
  • OAM packets are forwarded.
  • the network device further includes:
  • a second determining unit configured to determine whether the OAM packet meets a predetermined forwarding condition;
  • the forwarding unit is configured to forward the OAM packet when the OAM packet meets the predetermined forwarding condition.
  • the first OAM information further includes a first forwarding count value
  • the predetermined forwarding condition includes: the first forwarding count value is greater than a predetermined first threshold, and the first sink device ID is not an ID of a local network device;
  • the forwarding unit is specifically configured to: subtract the first forwarding counter value by a fixed value, and forward the OAM packet.
  • a third aspect of the present invention provides a network device, including: a processor and a memory connected to a bus, where:
  • the memory is configured to store an execution instruction
  • the processor is configured to communicate with the memory, and executing the execution instruction causes the network device to perform the following method:
  • the first IP packet includes an OAM packet
  • the IP packet header of the OAM packet includes first OAM information
  • the first OAM information includes a first source device ID and a first sink device ID
  • the second OAM information includes a second source device ID, a second sink device ID, and a second packet type, where the second source device ID is an ID of the local network device, and the second sink The device ID is the same as the first source device ID.
  • the method before the returning the second IP packet, the method further includes:
  • the returning the second IP packet is specifically: if the predetermined reply condition is met, returning the second IP packet, where the second OAM information further includes a second packet type, the second packet The file type is 0 AM to detect a reply message;
  • the first OAM information further includes a first packet type, where the predetermined reply condition includes: the first sink device ID is the same as the ID of the local network device, and the first packet type is OAM detects packets.
  • the method further includes:
  • the method before the forwarding the OAM packet, the method further includes:
  • the first OAM information further includes a first forwarding count value
  • the predetermined forwarding condition includes: the first forwarding counter value is greater than a predetermined first threshold, and the first sink device ID is not an ID of the local network device;
  • the forwarding of the OAM packet includes: subtracting the first forwarding counter value by a fixed value, and forwarding the OAM packet.
  • a fourth aspect of the present invention provides a network system, the system comprising at least two network devices as described in any one of the possible embodiments of the second aspect.
  • the IP packet header of the OAM packet carries the OAM information, and the OAM packet does not use a special Ethernet protocol type or a special destination MAC address or a special destination port number, OAM.
  • the IP packets of the packets in the link layer, the network layer, the transport layer, and the application layer are consistent with the IP packets of the service packets.
  • OAM packets and services are forwarded on the forwarding path (such as switches and routers).
  • the packets are transmitted through the same forwarding entry. If the forwarding entry related to the service packet is incorrect, the OAM packet and the service packet will be faulty.
  • the OAM mechanism can quickly detect the fault.
  • the prior art can improve the ability of OAM method for fault detection.
  • FIG. 1 is a schematic diagram of a network device connection in a network system according to an embodiment of the present invention
  • FIG. 2 is a first schematic diagram of a method for processing an OAM packet according to an embodiment of the present invention
  • FIG. 3 is a schematic diagram of an OAM packet according to an embodiment of the present invention
  • FIG. 4 is a third schematic diagram of a flow of a method for processing an OAM packet according to an embodiment of the present invention
  • FIG. 5 is a first schematic diagram of a structure of a network device according to an embodiment of the present invention
  • FIG. 6 is a second schematic diagram of a structure of a network device according to an embodiment of the present disclosure.
  • FIG. 7 is a third schematic diagram of a structure of a network device according to an embodiment of the present disclosure.
  • FIG. 8 is a fourth schematic diagram of a structure of a network device according to an embodiment of the present disclosure.
  • FIG. 9 is a fifth schematic diagram of a structure of a network device according to an embodiment of the present disclosure.
  • FIG. 10 is a sixth schematic diagram of a structure of a network device according to an embodiment of the present disclosure.
  • FIG. 11 is a seventh schematic diagram of a structure of a network device according to an embodiment of the present invention. detailed description
  • FIG. 1 is a schematic diagram of a network system according to an embodiment of the present invention.
  • the network system in the figure may include at least two network devices connected in communication, wherein the at least two network devices may be
  • the network device with the same function can implement the functions of initiating, receiving, forwarding, and replying of the OAM session (message). Of course, some of the network devices can also support only the partial AU session function.
  • the network devices mentioned may include network devices such as switches and routers.
  • 2 is a schematic flowchart of a method for processing an OAM packet according to an embodiment of the present invention.
  • the method for processing the OAM packet may be any possible network device in the foregoing network system. As shown in FIG. 2, the method is as shown in FIG. Can include:
  • the first IP packet is received, where the first IP packet includes an OAM packet, and the IP packet header of the OAM packet includes the first OAM information.
  • the first OAM information may include a first source device ID and a first sink device ID.
  • the OAM reply packet where the IP packet header of the OAM reply packet includes the second 0 AM information corresponding to the first OAM information;
  • the second OAM information may include a second source device ID and a second sink device ID, where the second source device ID is an ID of the local network device, and the second sink device ID is the same as the first source device ID.
  • the local network device may refer to a network device that performs the foregoing method. When a network device performs the foregoing method, it may be considered as a local network device.
  • the OAM information of the OAM packet is filled in the IP packet header to carry the OAM information by using the IP packet, and the OAM packet does not use a special Ethernet protocol type or a special destination MAC address or a special The destination port number, so that the IP packets of the OAM packets are consistent with the IP packets carrying the service packets on the link layer, the network layer, the transport layer, and the application layer, on the forwarding path (such as switches and routers).
  • the OAM packet and the service packet pass the same forwarding entry. If the forwarding entry related to the service packet is incorrect, the OAM packet and the service packet will be faulty.
  • the OAM mechanism can be used quickly. The failure is detected, and the defects of the prior art are overcome, thereby improving the ability of the OAM method for fault detection.
  • FIG. 3 is a schematic flowchart of another OAM packet processing method according to an embodiment of the present invention. As shown in FIG. 3, the method may include:
  • the first IP packet is received, where the first IP packet includes an OAM packet, and the IP packet header of the OAM packet includes the first OAM information.
  • the first OAM information may include a first source device ID, a first sink device ID, and a first packet. Types of;
  • the IP packet header has a plurality of optional options, and the optional domain is used to carry the first 0AM information, that is, the optional domain of the IP packet header of the 0AM packet includes the first OAM information;
  • the foregoing predetermined reply condition may include: the first sink device ID is the same as the ID of the local network device, and the first packet type is a 0AM detection packet;
  • the 0AM detection packet may include: a connectivity detection packet, a bidirectional delay detection packet, a loopback detection packet, a tracking detection packet, a packet loss detection packet, and the like;
  • the second OAM information may include a second source device ID, a second sink device ID, and a second packet type, where the second source device ID is an ID of the local network device, and the second sink device ID is the foregoing
  • the first source device ID is the same, and the second packet type is 0AM detection reply message;
  • the OAM detection response packet may include an OAM packet such as a connectivity detection response packet, a two-way delay detection response packet, a loopback detection response packet, a tracking detection response packet, and a packet loss detection response packet.
  • OAM packet such as a connectivity detection response packet, a two-way delay detection response packet, a loopback detection response packet, a tracking detection response packet, and a packet loss detection response packet.
  • the second packet type is corresponding to the first packet type, for example, the first packet type is a loopback detection packet, and the second packet type is a loopback detection response packet;
  • FIG. 4 is a schematic flowchart of another 0AM packet processing method according to an embodiment of the present invention. As shown in FIG. 4, the method may include:
  • the first IP packet is received, where the first IP packet includes a 0AM packet, and the IP packet header of the 0AM packet includes the first 0AM information.
  • the first 0AM information may include a first source device ID, a first sink device ID, a first packet type, and a first forwarding count value;
  • the first IP packet received by the local network device in the foregoing 402 may be from an OAM detection session initiated by one of the network devices in the network system, when the network device initiates the 0AM detection session. Fill the OAM information in the IP packet header of the OAM packet.
  • the foregoing predetermined reply condition may include: the first sink device ID is the same as the ID of the local network device, and the first packet type is an OAM detection packet;
  • the foregoing predetermined reply condition may further include: the first forwarding count value is less than or equal to a predetermined first threshold, and the OAM packet is a tracking packet;
  • the OAM detection packet may include: a connectivity detection packet, a bidirectional delay detection packet, a loopback detection packet, a tracking detection packet, a packet loss detection packet, and the like;
  • the OAM reply message, the IP packet header of the OAM reply message includes the second OAM information corresponding to the first OAM information;
  • the second OAM information may include a second source device ID, a second sink device ID, a second packet type, and a second forwarding count value, where the second source device ID is an ID of the local network device, where the foregoing
  • the second sink device ID is the same as the first source device ID
  • the second packet type is an OAM detection reply message
  • the second forwarding count value may be a predetermined initial value (for example, but not limited to 255);
  • the OAM detection response packet may include an OAM packet such as a connectivity detection response packet, a two-way delay detection response packet, a loopback detection response packet, a tracking detection response packet, and a packet loss detection response packet.
  • OAM packet such as a connectivity detection response packet, a two-way delay detection response packet, a loopback detection response packet, a tracking detection response packet, and a packet loss detection response packet.
  • the second packet type is corresponding to the first packet type, for example, the first packet type is a loopback detection packet, and the second packet type is a loopback detection response packet;
  • the foregoing predetermined forwarding condition may include: the first forwarding count value is greater than a predetermined first threshold, and the first sink device ID is not an ID of the local network device;
  • the first threshold may be 0.
  • the first threshold may also be other suitable values, such as 1, 10, etc.;
  • Step 410 Subtracting the first forwarding count value by a fixed value, and forwarding the OAM packet; ending the process;
  • the fixed value subtracted above may be 1, that is, the first forwarding in the OAM information.
  • the forwarding counter value carried in the OAM information is decremented by 1 each time the OAM packet is forwarded by a network device, and can be controlled by setting a combination of the forwarding counter value and the forwarding condition. Number of OAM packets forwarded;
  • the first OAM information may further include a first session identifier, and correspondingly, the second OAM information may also include a second session identifier, where the second session identifier may be the same as the first session identifier;
  • the foregoing reply message confirmation condition may include: the first sink device ID is the same as the local network device ID, the first message type is an OAM detection reply message, and the first session identifier is a session included with the OAM detection message initiated by the local network. The same identifier;
  • the local network device may initiate a detection session and fill the corresponding IP information in the IP packet header of the ⁇ detection message sent by the local network device, where the OAM information may include a session identifier, where the session identifier is used to identify a unique OAM detection session, the local network.
  • the device may record the session identifier of the OAM detection session initiated by the device;
  • the OAM packet of the OAM packet is received, the OAM packet of the OAM packet is verified by the OAM packet. The information is processed accordingly. For example, if the OAM packet is a connectivity check response packet and has not expired, the network can be confirmed to be unobstructed. If the timeout expires, the network congestion or network failure can be confirmed.
  • the foregoing first OAM information may further include information such as an OAM version, an OAM data, and the like, and the local network device may further determine, according to the OAM version included in the first OAM information, whether the OAM packet is supported. , discard OAM packets.
  • FIG. 5 is a schematic structural diagram of a network device according to an embodiment of the present invention. As shown in FIG. 5, the network device 500 may include:
  • the receiving unit 502 is configured to receive a first IP packet, where the first IP packet includes an OAM packet,
  • the IP packet header of the OAM packet includes the first OAM information, and the first OAM information includes the first source device ID and the first sink device ID.
  • the replying unit 504 is configured to return a second IP packet, and reply to the OAM packet, where the second IP packet includes an OAM reply packet, and the IP packet header of the OAM reply packet includes the first OAM information.
  • the second OAM information includes a second source device ID and a second sink device ID, where the second source device ID is an ID of the local network device, and the second sink device ID is configured by using the first source device. The ID is the same.
  • the OAM information of the processed OAM packet is filled in the IP packet header to carry the OAM information by using the IP packet, and the OAM packet does not use a special Ethernet protocol type or a special destination MAC address or a special The destination port number, so that the IP packets of the OAM packets are consistent with the IP packets carrying the service packets on the link layer, the network layer, the transport layer, and the application layer, on the forwarding path (such as switches and routers).
  • the OAM packet and the service packet pass the same forwarding entry. If the forwarding entry related to the service packet is incorrect, the OAM packet and the service packet will be faulty.
  • the OAM mechanism can be used quickly. The failure is detected, and the defects of the prior art are overcome, thereby improving the ability of the OAM method for fault detection.
  • the network device 500 may further include:
  • the first determining unit 503 is configured to determine whether the foregoing OAM message received by the receiving unit 502 meets a predetermined reply condition
  • the replying unit 504 can reply to the OAM packet when the OAM packet meets the predetermined reply condition
  • the foregoing first OAM information may further include a first packet type
  • the foregoing predetermined reply condition may include: the first sink device ID is the same as the ID of the local network device (the network device 500), and the first packet type is an OAM detection message;
  • the OAM detection packet may include: a connectivity detection packet, a bidirectional delay detection packet, a loopback detection packet, a tracking detection packet, a packet loss detection packet, and the like;
  • the second OAM information may also be a second packet type, and the second packet type is an OAM detection response packet;
  • the OAM detection response packet may include a connectivity detection response packet and a two-way delay. Detecting a reply message, a loopback detection reply message, a tracking detection reply message, a packet loss detection reply message, and the like, and the second message type corresponds to the first message type, for example, the first message type.
  • the second packet type is a loopback detection reply packet.
  • the network device 500 may further include a forwarding unit 506, where the forwarding unit 506 may be configured to: when the first determining unit 503 determines that the OAM packet does not meet the predetermined reply condition, The text is forwarded.
  • the first OAM information may further include a first forwarding count value.
  • the second OAM information may also include a second forwarding count value, where the second forwarding count value may be a predetermined initial value, such as 255 or other. The appropriate value.
  • the foregoing predetermined reply condition may further include: the first forwarding count value is less than or equal to a predetermined first threshold, and the OAM packet is a tracking packet;
  • the first threshold may be 0.
  • the first threshold may also be other suitable values, such as 1, 10, and the like.
  • the network device 500 may further include a second determining unit 505, and the second determining unit 505 is configured to determine whether the OAM packet received by the receiving unit 502 meets a predetermined forwarding condition.
  • the forwarding unit 506 can be configured to forward the OAM packet when the OAM packet meets the predetermined forwarding condition.
  • the foregoing predetermined forwarding condition may include: the first forwarding counter value is greater than the predetermined first threshold, and the first sink device ID is not the ID of the local network device.
  • the forwarding unit 506 is specifically configured to: subtract the foregoing first forwarding count value by a fixed value, and forward the OAM packet;
  • the specific value of the foregoing fixed value may be preferably 1, that is, the OAM packet is forwarded once, and the forwarding counter value is decreased by 1.
  • the fixed value may also be other suitable values, which is not specifically limited.
  • the first OAM information further includes a first session identifier
  • the second OAM information may also include a second session identifier, where the second session identifier may be the same as the first session identifier
  • the network device 500 may further include a third determining unit 508 and a processing unit 510, where the third determining unit 508 is configured to determine the foregoing OAM report received by the receiving unit 502. Whether the message satisfies the predetermined reply message confirmation condition, the processing unit 510 is configured to: when the OAM message meets the predetermined reply message confirmation condition, perform corresponding processing on the OAM message, including confirming network patency, network congestion, and network Failure and so on.
  • the foregoing predetermined reply message confirmation condition may include: the first sink device ID is the same as the local network device ID, the first packet type is an OAM detection reply message, and the first session identifier is associated with the local network initiated OAM.
  • the detection message includes the same session identifier.
  • the network device 500 may further include a session initiation unit 501, and the session initiation unit 501 may be configured to initiate an OAM detection session.
  • the session initiating unit 501 may include an OAM packet generating subunit, an OAM packet sending subunit, and a session identifier recording subunit, where the OAM packet generating subunit is configured to generate an OAM detecting packet, where the OAM detecting packet is The IP packet header is filled with the corresponding OAM information, and the OAM information may include a session identifier, where the session identifier is used to identify a unique OAM detection session, and the session identifier record sub-unit may record the session identifier of the OAM detection session initiated by the session initiation unit 501.
  • the first session identifier is compared with the session identifier recorded by the network device 500 to determine whether the OAM packet is a reply to the OAM detection session initiated by the network device 500. If yes, the corresponding information can be processed according to the information fed back by the OAM packet. For example, if the OAM packet is a connectivity check response packet and has not expired, the network can be confirmed to be unobstructed. If the timeout is exceeded, the network congestion can be confirmed. Or network failure.
  • the foregoing first OAM information may further include information such as an OAM version, OAM data, and the like, and the network device 500 may further determine, according to the OAM version included in the first OAM information, whether the supported OAM packet is supported. , discard OAM packets.
  • the network device 600 can include a processor 601 and a memory 603 connected to the bus 602. among them:
  • the above memory 603 can be used to store execution instructions; specifically, the memory 603 can store programs.
  • the program 604 can include program code, where the program code includes an execution instruction.
  • the memory 603 may include a high speed RAM memory, and may also include a non-volatile memory, such as at least one disk storage device;
  • the processor 601 can be used to communicate with the memory 603, and execute the above execution instructions to make The network device 600 performs the following methods:
  • the first IP packet includes an OAM packet
  • the IP packet header of the OAM packet includes the first OAM information.
  • the first OAM information may include the first source device ID and the first sink device ID. ;
  • the second OAM information may include a second source device ID and a second sink device ID, where the second source device ID is an ID of the local network device, and the second sink device ID is the same as the first source device ID.
  • the method may further include:
  • the above-mentioned second IP packet is returned to the second IP packet, and the second IP packet is returned to the second IP packet, and the second OAM information includes the second packet type, and the second packet.
  • the type is OAM detection reply message
  • the first OAM information further includes a first packet type
  • the predetermined response condition includes: the first sink device ID is the same as the ID of the local network device, and the first packet type is an OAM detection packet.
  • the method may further include: forwarding the OAM packet if the OAM packet does not meet the predetermined reply condition.
  • the method further includes:
  • the first OAM information further includes a first forwarding count value
  • the foregoing predetermined forwarding condition includes: the first forwarding counter value is greater than a predetermined first threshold, and the first sink device ID is not an ID of the local network device;
  • the foregoing forwarding of the OAM packet includes: subtracting the first forwarding count value by a fixed value, and forwarding the OAM packet.
  • the first OAM information further includes a first session identifier;
  • the method may further include: determining whether the OAM message meets a predetermined reply message confirmation bar. If it is satisfied, the corresponding processing is performed according to the above OAM message;
  • the foregoing reply message confirmation condition may include: the first sink device ID is the same as the local network device ID, the first packet type is an OAM detection reply message, and the first session identifier is generated by the local network and the OAM detection report initiated by the local network.
  • the text includes the same session identifier.
  • the foregoing processor performs the execution of the instructions to cause the network device 600 to perform the method, and the implementation principle and technical effects thereof are similar to those described in the foregoing embodiments. Specific implementation details are not described herein again.
  • the embodiment of the present invention further provides a computer readable medium, which includes a computer-executed instruction, and the computer-executable instruction enables the network device 600 to perform the method described in the embodiment of the present invention, and the implementation principle and technical effect thereof are compared with the previous embodiment. Similar, it will not be described here. And the system is described.
  • the network device S1, the network device S2, the network device S3, and the network device S4 are included, wherein S2 is respectively connected with S1 and S3, and S3 is also connected with S4, and the network device has been connected up and down.
  • the matching traffic forwarding entry of the traffic flow, the uplink and downlink traffic is communicating normally, and now it is necessary to detect in real time whether the communication of the uplink traffic between S1 and S4 is normal, and then initiate a periodic connectivity detection OAM session:
  • the matching forwarding flow entries of the upstream service flow are as follows:
  • the matching forwarding flow entries of the downlink service flow are shown in the following table:
  • S1 fills the OAM information of the connectivity check message in the IP packet header, and sends an IP packet to the S2 through the port 1;
  • the OAM information of the connectivity check packet may include: OAM version (0x01), forwarding count value (255) ), message type (connectivity detection), source device ID (S1), sink device ID (S4), session identifier (0001);
  • the above IP packet also carries the source MAC address (00:1A:CA:00:C5:DC) and the source IP address.
  • destination MAC address (00:1A:CA:00:C5:DA) and destination IP address (192.168.20.35);
  • the S2 After receiving the IP packet, the S2 obtains the connectivity check packet, determines the version of the packet, reduces the forwarding counter value by 1 (becomes 254), and detects that the sink device ID is not S2 (satisfying the forwarding condition). Forwarding the connectivity check packet to S3 through port 3.
  • S3 receives the IP packet, and obtains the connectivity check packet after parsing. It judges that the packet version is supported, reduces the forwarding counter value by 1 (becomes 253), and detects that the sink device ID is not S3 (satisfying the forwarding condition). Forwarding the connectivity check packet to S4 through port 4.
  • the S4 receives the IP packet, and obtains the connectivity check packet after parsing. It judges that the packet version is supported.
  • the forwarding counter value is decremented by 1 (becomes 252), the sink device ID is detected as S4, and the connectivity check packet satisfies the reply.
  • the condition is that the connectivity detection response packet is generated, and the OAM information of the connectivity detection reply packet is filled in the IP packet header, and the IP packet is sent to the S3 through the port 3.
  • the OAM information of the connectivity detection response packet includes: OAM version (0x01), forwarding count value (255), message type (connectivity detection reply), source device ID (S4), sink device ID (S1), session identifier (0001);
  • the S4 needs to reverse the MAC address and IP address of the IP packet, and the connectivity of the detected packet detects the IP packet carrying the source MAC address (00:1A:CA:00:C5:DA) and the source IP address.
  • source MAC address (00:1A:CA:00:C5:DC) and destination IP address
  • the SI receives the IP packet, and obtains the connectivity detection reply packet after parsing, and judges that the version of the packet is supported, and the forwarding counter value is decremented by 1 (becomes 252), and the packet type is detected as the connectivity detection reply packet, and the packet is detected.
  • the device ID is S1
  • the session identifier is consistent with the session identifier of the locally initiated connectivity check packet
  • the connectivity check response packet is a reply packet of the connectivity check packet initiated by the connectivity check packet, and the timeout period is not exceeded.
  • the OAM message processing method, the network device, and the network system provided in this embodiment are used to carry the OAM information of the OAM packet in the IP packet header, and the OAM packet does not use a special one. Ethernet protocol type/special destination MAC address/special destination port number.
  • the IP packets of OAM packets are kept at the link layer, network layer, transport layer, and application layer with IP packets carrying service packets.
  • the OAM packet and the service packet are transmitted on the forwarding path (such as the switch and the router).
  • the OAM packet and the service packet pass the same forwarding entry. If there is an error in the forwarding entry related to the service packet, the OAM packet and the service packet are incorrect. The same failure occurs in the text.
  • the OAM mechanism can quickly detect the fault and overcome the defects of the prior art, thereby improving the ability of the OAM method for fault detection.
  • the foregoing program may be stored in a computer readable storage medium, and the program is executed when executed.
  • the foregoing steps include the steps of the foregoing method embodiments; and the foregoing storage medium includes: a medium that can store program codes, such as a ROM, a RAM, a magnetic disk, or an optical disk.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Health & Medical Sciences (AREA)
  • Cardiology (AREA)
  • General Health & Medical Sciences (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

L'invention concerne un procédé de traitement de paquets OAM, un dispositif de réseau, et un système de réseau. Le procédé consiste à : recevoir un premier paquet IP contenant un paquet OAM dont l'en-tête contient des premières informations OAM comprenant des premières informations OAM qui comprennent un premier ID de dispositif source et un premier ID de dispositif collecteur ; retourner un second paquet IP en réponse au paquet OAM, le second paquet IP contenant un paquet de réponse OAM dont l'en-tête contient des secondes informations OAM qui correspondent aux premières informations OAM. Les secondes informations comprennent un second ID de dispositif source, un second ID de dispositif collecteur et un second type de paquet. Le second ID de dispositif source est l'ID d'un dispositif de réseau local, et le second ID de dispositif collecteur est identique à l'ID du premier dispositif source. La présente invention peut améliorer la capacité de détection de défaillance du procédé OAM en transportant des informations OAM dans l'en-tête IP.
PCT/CN2014/074808 2014-04-04 2014-04-04 Procédé de traitement de paquets oam, dispositif de réseau, et système de réseau WO2015149353A1 (fr)

Priority Applications (4)

Application Number Priority Date Filing Date Title
PCT/CN2014/074808 WO2015149353A1 (fr) 2014-04-04 2014-04-04 Procédé de traitement de paquets oam, dispositif de réseau, et système de réseau
CN201480000456.6A CN105308904B (zh) 2014-04-04 2014-04-04 一种oam报文处理方法、网络设备和网络系统
EP14887910.9A EP3116160B1 (fr) 2014-04-04 2014-04-04 Procédé de traitement de paquets oam, dispositif de réseau, et système de réseau
US15/284,696 US10116546B2 (en) 2014-04-04 2016-10-04 OAM packet processing method, network device, and network system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2014/074808 WO2015149353A1 (fr) 2014-04-04 2014-04-04 Procédé de traitement de paquets oam, dispositif de réseau, et système de réseau

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/284,696 Continuation US10116546B2 (en) 2014-04-04 2016-10-04 OAM packet processing method, network device, and network system

Publications (1)

Publication Number Publication Date
WO2015149353A1 true WO2015149353A1 (fr) 2015-10-08

Family

ID=54239324

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/074808 WO2015149353A1 (fr) 2014-04-04 2014-04-04 Procédé de traitement de paquets oam, dispositif de réseau, et système de réseau

Country Status (4)

Country Link
US (1) US10116546B2 (fr)
EP (1) EP3116160B1 (fr)
CN (1) CN105308904B (fr)
WO (1) WO2015149353A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108206746A (zh) * 2016-12-16 2018-06-26 华为技术有限公司 一种网络传输控制方法及相关设备
CN111371736A (zh) * 2018-12-26 2020-07-03 中兴通讯股份有限公司 iOAM信息处理方法、装置及计算机可读存储介质

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107517117B (zh) * 2016-06-17 2022-04-08 深圳市中兴通讯技术服务有限责任公司 一种ip层oam告警方法、装置及网络节点
US10638288B2 (en) 2017-05-15 2020-04-28 At&T Intellectual Property I, L.P. Embedded device identification information in packetized communications
CN113542008A (zh) * 2019-09-24 2021-10-22 华为技术有限公司 一种网络的oam方法及装置
CN112672363B (zh) * 2019-10-15 2023-04-18 华为技术有限公司 随流信息遥测能力的确认方法和设备
CN111917608B (zh) * 2020-08-07 2022-01-04 深圳市友华软件科技有限公司 基于Linux系统设备的Internet连通性的判断方法和装置
WO2022033034A1 (fr) * 2020-08-14 2022-02-17 华为技术有限公司 Procédé, dispositif et système de détection d'oam
CN112152919A (zh) * 2020-09-23 2020-12-29 杭州迪普科技股份有限公司 路由维护方法、装置、设备及计算机可读存储介质

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080031146A1 (en) * 2006-08-03 2008-02-07 Kwak Dong Y Method and apparatus for measuring label switch path performance parameters using performance monitoring operation and management packet in multi-protocol label switching network
CN101471813A (zh) * 2007-12-29 2009-07-01 华为技术有限公司 一种实现跨域维护管理的配置方法、系统及设备
CN102347905A (zh) * 2011-10-31 2012-02-08 杭州华三通信技术有限公司 一种网络设备及其转发信息更新方法

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100417080C (zh) * 2005-02-01 2008-09-03 华为技术有限公司 一种检测网络链路故障并定位故障的方法
US8279759B1 (en) * 2005-03-07 2012-10-02 Verizon Services Corp. Protocol inter-worked ping mechanism
US7898965B2 (en) * 2007-10-12 2011-03-01 Nortel Networks Limited IP network and performance monitoring using ethernet OAM
US8964563B2 (en) * 2011-07-08 2015-02-24 Telefonaktiebolaget L M Ericsson (Publ) Controller driven OAM for OpenFlow
CN103580894B (zh) * 2012-07-31 2017-09-29 华为技术有限公司 操作、管理和维护oam配置的方法、设备及系统
CN102904775B (zh) * 2012-09-29 2015-04-29 华为技术有限公司 网络丢包测量方法、设备和系统

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080031146A1 (en) * 2006-08-03 2008-02-07 Kwak Dong Y Method and apparatus for measuring label switch path performance parameters using performance monitoring operation and management packet in multi-protocol label switching network
CN101471813A (zh) * 2007-12-29 2009-07-01 华为技术有限公司 一种实现跨域维护管理的配置方法、系统及设备
CN102347905A (zh) * 2011-10-31 2012-02-08 杭州华三通信技术有限公司 一种网络设备及其转发信息更新方法

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3116160A4 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108206746A (zh) * 2016-12-16 2018-06-26 华为技术有限公司 一种网络传输控制方法及相关设备
EP3468101A4 (fr) * 2016-12-16 2019-07-17 Huawei Technologies Co., Ltd. Procédé de contrôle de transmission réseau, et dispositif associé
CN111371736A (zh) * 2018-12-26 2020-07-03 中兴通讯股份有限公司 iOAM信息处理方法、装置及计算机可读存储介质

Also Published As

Publication number Publication date
EP3116160B1 (fr) 2017-11-15
US20170026269A1 (en) 2017-01-26
US10116546B2 (en) 2018-10-30
CN105308904A (zh) 2016-02-03
CN105308904B (zh) 2019-05-21
EP3116160A4 (fr) 2017-01-11
EP3116160A1 (fr) 2017-01-11

Similar Documents

Publication Publication Date Title
WO2015149353A1 (fr) Procédé de traitement de paquets oam, dispositif de réseau, et système de réseau
EP3332511B1 (fr) Procédé et système pour une surveillance de chemin dans un système de réseautage défini par logiciel (sdn)
US9294343B2 (en) System and method using RSVP hello suppression for graceful restart capable neighbors
US9686199B2 (en) Method and system for implementing ethernet OAM in a software-defined networking (SDN) system
US8982710B2 (en) Ethernet operation and maintenance (OAM) with flexible forwarding
JP4840236B2 (ja) ネットワークシステム及びノード装置
JP5801175B2 (ja) パケット通信装置および方法
WO2016058245A1 (fr) Procédé et appareil de traitement pour un message d'exploitation, d'administration et d'entretien (oam)
US9059902B2 (en) Procedures, apparatuses, systems, and computer-readable media for operating primary and backup network elements
US20120087232A1 (en) Link state relay for physical layer emulation
WO2009046644A1 (fr) Procédé et dispositif pour la commutation de flux de trafic
WO2016106743A1 (fr) Procédé, dispositif et système permettant d'effectuer une détection de transfert bidirectionnel sur liaison agrégée
EP2604001B1 (fr) Redondance du protocole de vérification de connectivité distribuée
WO2012155817A1 (fr) Procédé, dispositif et système d'essai de bouclage
US8971195B2 (en) Querying health of full-meshed forwarding planes
WO2014019348A1 (fr) Procédé, dispositif et système pour l'exploitation, la gestion et la maintenance de configuration oam
Mizrahi et al. An overview of operations, administration, and maintenance (OAM) tools
JP6472876B2 (ja) コンピュータ・プログラム、装置及び記憶媒体
WO2014101185A1 (fr) Procédé, appareil et système de détection des performances d'un canal de multidiffusion
WO2012071851A1 (fr) Procédé et dispositif de réglage d'un intervalle de transmission de détection de transfert bidirectionnel en fonction de la gigue du réseau
WO2017206785A1 (fr) Élément de réseau, procédé et système de commutation de protection, et support de stockage
WO2014008809A1 (fr) Procédé et système pour la détection de perte de trames
WO2014000509A1 (fr) Dispositif et procédé de surveillance de transmission
Mizrahi et al. RFC 7276: An Overview of Operations, Administration, and Maintenance (OAM) Tools

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 201480000456.6

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14887910

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

REEP Request for entry into the european phase

Ref document number: 2014887910

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2014887910

Country of ref document: EP